07-27-2018 04:26 PM - edited 02-21-2020 08:01 AM
Is it possible to have two different outbound links and NAT them based on VLAN on a ASA 5520?
I have 3 VLANs trunked to the ASA in a router-on-a-stick design and two links to the Internet. I'm trying to NAT 2 of the VLANs out the second outbound interface, but it won't work. However, if I NAT out of the first everything works perfectly fine:
nat (inside,outside) dynamic interface nat (vlan10,outside) dynamic interface nat (vlan20,outside) dynamic interface
But as soon as I change it to outside2 outbound connections stop working:
nat (inside,outside) dynamic interface nat (vlan10,outside2) dynamic interface nat (vlan20,outside2) dynamic interface
Are you allowed to have 2 outbound interfaces on an ASA and can you NAT through them? If so, can you spot what I am doing wrong?
Thank you!
Solved! Go to Solution.
07-31-2018 06:41 PM
07-27-2018 04:37 PM
We are not sure what is VLAN 10 and VLAN 20 IP ?
Can we have 3 VLAN IP address and full configuration to review.
Are you looking to setup failover link ? what is the goal of 2 ISP link ?
BB
07-27-2018 09:04 PM
07-31-2018 02:48 PM
07-31-2018 06:41 PM
08-01-2018 10:26 AM
08-01-2018 03:07 PM
08-01-2018 09:43 AM
Hello, there is a way to do it by working with Traffic Zones, which is introduced on ASA code 9.3, however, the ASA5520 supports only up to 9.1 ASA code.
The ISP SLA option already given to you will work as well but will be only on a link failover basis.
It depends on if you need to work with 2 active Internet links or 1 active and a standby internet link.
I leave you here the information about traffic zones: https://www.cisco.com/c/en/us/td/docs/security/asa/asa93/release/notes/asarn93.html
08-01-2018 10:23 AM
Unfortunately for my situation I needed two active links and traffic sent based on their originating VLAN/network.
However, now that I've glanced over the traffic zones post I might be able to work with that since I know what ports that I will be working with.
If that becomes too cumbersome I think I'll pull everything back and route it with the layer 3 switch. That should take care of it, but it'll just make things a little more difficult for the hosts that needed to be in the dmz.
That is something that I will have to weigh and decide if the pros outweigh the cons.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide